Justice Information Sharing

FC122 Intellectual Property Theft Training (June 11, 2020, Virtual)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

FC099 Basic Level Spreadsheeting Skills (June 12, 2020, Virtual)

This one-day course provides foundational spreadsheeting knowledge and skills to enhance workplace productivity. The course covers basic navigation of Microsoft Excel by combining live demonstrations and hands-on exercises, including the following:

  • Working with multiple worksheets within a workbook 
  • Hiding, unhiding, and protecting worksheets 
  • Adjusting rows and columns 
  • Using copy and paste options 
  • Finding, selecting, and sorting data

FC122 Intellectual Property Theft Training (June 18, 2020, Virtual)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

CI102 Basic Cyber Investigations: Dark Web & Open Source Intelligence (Virtual, June 2020)

This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites. 

FC102 Financial Investigations Triage (Virtual, June 2020)

This course provides an overview of the actions investigators can take at the outset of a financial crime investigation. Students learn to ask critical questions, gather documentation, and analyze information for leads. Topics include obtaining and working with financial records, red flags in financial cases, money laundering, investigative strategies for different types of financial crimes, and commingled funds.

Autopsy: Open Source Digital Forensics Basics Part 1

Autopsy is a free and open source digital forensics platform with many features comparable to those found in the leading commercial tools. It can be installed on Windows, macOS, and Linux operating systems. In part 1 in a two-part series, this webinar will start by walking through setting up a new case and exploring effective tool usage. Attendees will then learn digital forensics best practices and methods for quickly locating items of evidentiary value.

Understanding Facebook Search Warrant Returns

Data of evidentiary value in criminal cases is generated both on the suspect device and the services it utilizes. While recovery of data from the suspect device is regularly performed, user account data stored off-device from these services often remains overlooked. This overlooked data is increasingly becoming crucial evidence in cases. In this webinar, we will manually review a Facebook search warrant return examining the different artifacts that can be provided within a return. Once manual examination is complete, a review of the same return with an automated tool will be conducted so the two methods of examination can be compared.

Encryption, Encoding, Inaccessible Data and Devices

Hash, encryption, full disk, file based, and the list goes on! Words used correctly and incorrectly when examiners discuss or even report on evidence. This webinar is intended to lay the framework for a factual understanding of how encryption and hashing are used in our digital investigations. Real world applications of hashing, and encryption will be shown, with an emphasis on how they impact investigations in 2020. Questions such as: "Does the application encrypt data?", "How is it encrypted?", and "Why can't I decrypt it?" will be discussed.

Pages